MITRE ATT&CK®

Stealing the data

MITRE ATT&CK - Stealing the data

Please tell us a little about yourself:

MITRE ATT&CK - Stealing the data
Huntsman

This is the third instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® - Infiltrating the network”. In the previous article, we looked at how an attacker enumerated and discovered credentials, accounts, data and other systems on the network to spread to other targets.

We will now look at the final attack stages - gathering and exfiltrating sensitive data while preventing recovery.

GET THE PDF NOW